Chapter 12
11 Pages

Chapter 12

Course Number: COM 308, Fall 2010

College/University: St. Leo

Word Count: 2915

Rating:

Document Preview

12 True/False Indicate whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well. 2. As threats evolve or new vulnerabilities in the systems emerge, the information security team...

Unformatted Document Excerpt
Coursehero >> Florida >> St. Leo >> COM 308

Course Hero has millions of student submitted documents similar to the one
below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Course Hero has millions of student submitted documents similar to the one below including study guides, practice problems, reference materials, practice exams, textbook help and tutor support.

Indicate 12 True/False whether the statement is true or false. ____ ____ ____ ____ ____ ____ ____ ____ ____ 1. If an organization deals successfully with change and has created procedures and systems that can be adjusted to the environment, the existing security improvement program will probably continue to work well. 2. As threats evolve or new vulnerabilities in the systems emerge, the information security team must determine if a shift in the priorities of the organizations security posture is required. 3. The tracking of trouble tickets should include tracking problem resolution. 4. Policies can be considered enforceable even if they have not been understood and agreed to. 5. Users do not participate in configuration management. 6. Documentation procedures are not required for configuration and change management processes. 7. When the amount of data stored on a particular hard drive averages 30-40% of available capacity for a prolonged period, consider an upgrade for the hard drive. 8. A maintenance model such as the ISO model deals with methods to manage and operate systems. 9. External monitoring entails collecting intelligence from various data sources, and then giving that intelligence context and meaning for use by decision makers within the organization. ____ 10. Often, US-CERT is viewed as a definitive authority with regard to computer and information security events. ____ 11. Many publicly accessible information sources, both mailing lists and Web sites, are available to those organizations and individuals who have the time, expertise, and grant access to make use of them. ____ 12. Over time, external monitoring processes should capture information about the external environment in a format that can be referenced both across the organization as threats emerge and for historical use. ____ 13. The value of internal monitoring is low when the resulting knowledge of the network and systems configuration is fed into the vulnerability assessment and remediation maintenance domain. ____ 14. The characteristics concerned with manufacturer and software versions are about technical functionality and they should be kept highly accurate and up-to-date. ____ 15. The target selection step involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed. ____ 16. The intranet scan starts with an Internet search engine. ____ 17. All systems that are mission critical should be enrolled in PSV measurement. ____ 18. All telephone numbers controlled by an organization should be tested, unless the configuration of the phone equipment on premises can assure that no number can be dialed from the worldwide telephone system. ____ 19. The vulnerability database, like the risk, threat, and attack database, both stores and tracks information. ____ 20. Remediation of vulnerabilities can be accomplished by accepting or transferring the risk, removing the threat, or repairing the vulnerability. ____ 21. In some instances, risk is acknowledged as being part of an organizations business process. ____ 22. Threats cannot be removed without requiring a repair of the vulnerability. ____ 23. Rehearsal adds value by exercising the procedures, identifying shortcomings, and providing security personnel the opportunity to improve the security plan before it is needed. ____ 24. Policy needs to be reviewed periodically. ____ 25. Major planning components should be reviewed on a periodic basis to ensure that they are current, accurate, and appropriate. Modified True/False Indicate whether the statement is true or false. If false, change the identified word or phrase to make the statement true. ____ 26. The CISO uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________ ____ 27. In the original ISO model, real management is the process of identifying, tracking, diagnosing, and resolving faults in the system. _________________________ ____ 28. A trouble ticket is closed when a user calls about an issue. _________________________ ____ 29. Facilities management is the administration of the configuration of the components of the security program. _________________________ ____ 30. In order to assist in the actual management of information security programs, organizations should adopt a formal management standard that can provide some insight about what processes and procedures are needed. _________________________ ____ 31. ISO 7799 (Part 2) introduces a process model with a set of steps called Plan-Do-Check-Act. _________________________ ____ 32. CERTs stands for computer emergency recovery teams. _________________________ ____ 33. UN-CERT is a set of moderated mailing lists full of detailed, full-disclosure discussions and announcements about computer security vulnerabilities. _________________________ ____ 34. Specific routine bulletins are issued when developing threats and specific attacks pose a measurable risk to the organization. _________________________ ____ 35. The basic function of the external monitoring process is to monitor activity, report results, and escalate warnings. The summaries present either statistical results or itemized lists of significant new vulnerabilities. _________________________ ____ 36. The primary goal of the external monitoring domain is to maintain an informed awareness of the state of all of the organizations networks, information systems, and information security defenses. _________________________ ____ 37. Organizations should have a carefully planned and fully populated inventory of all their network devices, communication channels, and computing devices. _________________________ ____ 38. The primary value of active evolution in an organization-wide IT governance process is the increased awareness of the impact of change. _________________________ ____ 39. Many organizations have an architecture review board designated to plan, review, and approve managed technology. _________________________ ____ 40. To be put to the most effective use, the information that comes from the IDPS must be integrated into the inventory process. _________________________ ____ 41. An example of the type of vulnerability exposed via traffic analysis can be observed when an organization is trying to determine if all its device signatures have been adequately masked. _________________________ ____ 42. The process of identifying and documenting specific and provable flaws in the organizations information asset environment is called VA. _________________________ ____ 43. The internal vulnerability assessment is usually performed against all public-facing addresses, using every possible penetration testing approach. _________________________ ____ 44. You can document the results of the verification by saving a(n) profile. _________________________ ____ 45. WLAN stands for wide local area network. _________________________ ____ 46. The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________ ____ 47. The optimum solution in most cases is to repair the vulnerability. _________________________ ____ 48. When possible, major plan elements should be rehearsed. _________________________ ____ 49. The CERT uses the results of maintenance activities and the review of the information security program to determine if the status quo can adequately meet the threats at hand. _________________________ ____ 50. A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________ Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 51. ____ are a component of the security triple. a. Threats c. Vulnerabilities b. Assets d. All of the above ____ 52. The information security personnel who perform penetration testing are often consultants or outsourced contractors, and are commonly referred to as ____. a. whitehat hackers c. tiger teams b. ethical hackers d. All of the above ____ 53. ____ involves security personnel simulating or performing specific and controlled attacks to compromise or disrupt their own systems by exploiting documented vulnerabilities. a. Penetration testing c. Attack simulation b. Penetration simulation d. Attack testing ____ 54. ____ management is the administration of changes in the strategy, operation, or components of the information security program. a. Revision c. Upload b. Update d. Change ____ 55. ____ enables organizations to charge their internal departments for system use. a. Auditing c. Change management b. Chargeback accounting d. Performance baseline ____ 56. When the memory usage associated with a particular CPU-based system averages ____% or more over prolonged periods, consider adding more memory. a. 30 c. 90 b. 60 d. 100 ____ 57. ____ specifies requirements for establishing, implementing, and documenting an information security management system. ____ 58. ____ 59. ____ 60. ____ 61. ____ 62. ____ 63. ____ 64. ____ 65. ____ 66. ____ 67. ____ 68. ____ 69. ____ 70. a. ISO 27001 c. BS 7799 b. ISO 27002 d. BS 17799 The Plan-Do-Check-Act process is an implementation of the ____ approach to internal controls to manage risk. a. CNSS 4012 c. ISO 27001 b. NIST SP800-12 d. ISO 1899 The primary mailing list, called simply ____, provides time-sensitive coverage of emerging vulnerabilities, documenting how they are exploited, and reporting on how to remediate them. Individuals can register for the flagship mailing list or any one of the entire family of its mailing lists. a. Bug c. Buglist b. Bugfix d. Bugtraq The ____ is a part of the US-CERT and is located at the Software Engineering Institute, a federally funded research and development center operated by Carnegie Mellon University. a. Bug/CERT c. CC/CERT b. Bugtraq/CERT d. CERT/CC The ____ list is intended to facilitate the development of a free network exploration tool. a. Nmap-hackers c. Security Focus b. Packet Storm d. Snort-sigs The ____ commercial site focuses on current security tool resources. a. Nmap-hackers c. Security Laser b. Packet Storm d. Snort-sigs The ____ mailing list includes announcements and discussion of an open source IDS. a. Nmap-hackers c. Security Focus b. Packet Storm d. Snort-sigs The optimum approach for escalation is based on a thorough integration of the monitoring process into the ____. a. IDE c. ERP b. CERT d. IRP Detailed ____ on the highest risk warnings can include identifying which vendor updates apply to which vulnerabilities as well as which types of defenses have been found to work against the specific vulnerabilities reported. a. escalation c. monitoring b. intelligence d. None of the above As an alternative view of the way data flows into the monitoring a(n) process, ____ approach may prove useful. a. DTD c. Schema b. DFD d. ERP The process of building awareness of change requires a leadership and educational role for the ____. a. VP c. CISO b. CEO d. CTO One approach that can improve the situational awareness of the information security function uses a process known as ____ to quickly identify changes to the internal environment. a. baseline c. differential b. difference analysis d. revision ____ is used to respond to network change requests and network architectural design proposals. a. Network connectivity RA c. Application RA b. Dialed modem RA d. Vulnerability RA A(n) ____ is a statement of the boundaries of the RA. ____ 71. ____ 72. ____ 73. ____ 74. ____ 75. a. scope c. footer b. disclaimer d. head There are ____ common vulnerability assessment processes. a. two c. four b. three d. five The steps of the Internet vulnerability assessment include ____, which is when the penetration test engine is unleashed at the scheduled time using the planned target list and test selection. a. Scanning c. Test selection b. Target selection d. Analysis The ____ vulnerability assessment process is designed to find and document selected vulnerabilities that are likely to be present on the internal network of the organization. a. intranet c. LAN b. Internet d. WAN The ____ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization. a. ASP c. SVP b. ISP d. PSV The ____ vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organizations networks. a. modem c. dial b. phone d. network Completion Complete each statement. 76. The CISO must constantly monitor the three components of the security ____________________. 77. As the help desk personnel screen problems, they must also track the activities involved in resolving each complaint in a help desk information system The tracking process is commonly implemented using a(n) ____________________ ticket. 78. The information security management model continues with ____________________ management and change management. 79. ____________________ is the process of reviewing the use of a system, not to check performance, but rather to determine if misuse or malfeasance has occurred. 80. A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared. 81. The objective of the external ____________________ domain within the maintenance model is to provide the early awareness of new and emerging threats, threat agents, vulnerabilities, and attacks that the organization needs in order to mount an effective and timely defense. 82. The primary goal of the ____________________ monitoring domain is to maintain an informed awareness of the state of all of the organizations networks, information systems, and information security defenses. 83. The process of collecting detailed information about devices in a network is often referred to as ____________________. 84. A(n) ____________________ analysis is a procedure that compares the current state of a network segment (the systems and services it offers) against a known previous state of that same network segment (the baseline of systems and services). 85. The primary objective of the planning and risk ____________________ domain is to keep a lookout over the entire information security program. 86. A key component in the engine that drives change in the information security program is a relatively straightforward process called an information security ____________________ risk assessment. 87. The primary goal of the vulnerability assessment and ____________________ domain is to identify specific, documented vulnerabilities and remediate them in a timely fashion. 88. The process of identifying and documenting specific and provable flaws in the organizations information asset environment is called ____________________ assessment. 89. The ____________________ vulnerability assessment process is designed to find and document the vulnerabilities that may be present in the public-facing network of the organization. 90. During the analysis step of Internet vulnerability assessment, the analyst must document the results of the verification by saving a(n) ____________________ (usually a screenshot) that can be used to convince skeptical systems administrators that the vulnerability is real. 91. The platform security ____________________ process is designed to find and document the vulnerabilities that may be present because there are misconfigured systems in use within the organization. 92. The ____________________ vulnerability assessment process is designed to find and document the vulnerabilities that may be present in the wireless local area networks of the organization. 93. The ____________________ vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organizations networks. 94. The primary goal of the readiness and ____________________ domain is to keep the information security program functioning as designed and to keep it continuously improving over time. 95. Rehearsals that closely match reality are called ____________________ games. 96. The modem vulnerability assessment process is designed to find and document any vulnerability that is present on dial-up modems connected to the organizations networks. One of the elements of this process involves using scripted dialing attacks against a pool of phone numbers; this is often called war ____________________. 97. The ____________________ interconnections are network devices, communications channels, and applications that may not be owned by the organization but are essential to the continued operation of the organizations partnership with another company. 98. When an organization uses specific software products as part of its information security program, the ____________________ often provides either direct support or indirect tools that allow user communities to support each other. 99. The proven cases of real vulnerabilities can be considered vulnerability ____________________. 100. The Analysis step of Internet vulnerability assessment is when a knowledgeable and experienced vulnerability analyst screens the test results for the candidate ____________________ logged during scanning. Essay 101. List five areas of the ISO model. 102. List and describe the steps associated with configuration management. 103. List the five domains of the recommended maintenance model. 12 Answer Section TRUE/FALSE 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerT T F F F F F T T F T F T F F T F T T T F T T T PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 511 511 513 515 514 516 518 519 521 522 522 525 526 527 538 539 541 542 543 543 543 544 545 545 544 MODIFIED TRUE/FALSE 26. Register to View Answer27. Register to View Answerfault PTS: 1 28. Register to View Answeropened REF: 512 PTS: 1 REF: 545 PTS: 1 REF: 513 29. Register to View AnswerConfiguration PTS: 1 REF: 514 30. Register to View Answer31. Register to View AnswerISO 27001 PTS: 1 REF: 519 PTS: 1 32. Register to View Answerresponse PTS: 1 33. Register to View AnswerBugtraq PTS: 1 34. Register to View Answerwarning PTS: 1 35. Register to View Answer36. Register to View Answerinternal REF: 519 REF: 522 REF: 522 REF: 525 PTS: 1 REF: 525 PTS: 1 REF: 526 37. Register to View Answer38. Register to View Answerengagement PTS: 1 REF: 528 39. Register to View Answer40. Register to View Answermaintenance PTS: 41. ANS: 42. ANS: 43. ANS: 1 T T F, Internet REF: 528 PTS: 1 REF: 527 PTS: 1 REF: 528 PTS: 1 PTS: 1 REF: 538 REF: 539 REF: 529 REF: 537 PTS: 1 44. Register to View Answertrophy PTS: 1 45. Register to View Answerwireless PTS: 1 REF: 542 46. Register to View Answerremediation PTS: 47. ANS: 48. ANS: 49. ANS: 1 T T F, CISO REF: 543 PTS: 1 PTS: 1 REF: 545 PTS: 1 REF: 546 REF: 544 REF: 544 PTS: 1 50. Register to View Answer MULTIPLE CHOICE 51. Register to View Answer52. Register to View AnswerPTS: 1 PTS: 1 REF: 511 REF: 512 53. 54. 55. 56. 57. 58. 59. 60. 61. 62. 63. 64. 65. 66. 67. 68. 69. 70. 71. 72. 73. 74. 75. ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: ANS: Register to View AnswerD B B A C D D A B D D B B C B A A D A A D A PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: PTS: 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: REF: 512 514 517 518 519 519 522 522 524 524 524 524-525 525 525 528 529 532 533 537 538 539 540 542 COMPLETION 76. ANS: triple PTS: 1 77. ANS: trouble REF: 558 PTS: 1 REF: 513 78. ANS: configuration PTS: 1 79. ANS: Auditing PTS: 1 80. ANS: baseline PTS: 1 81. ANS: monitoring PTS: 1 82. ANS: internal PTS: 1 REF: 514 REF: 517 REF: 518 REF: 521 REF: 526 83. ANS: characterization PTS: 1 84. ANS: difference PTS: 1 85. ANS: assessment PTS: 1 86. ANS: operational PTS: 1 87. ANS: remediation REF: 527 REF: 529 REF: 530 REF: 532 PTS: 1 REF: 536 88. ANS: vulnerability PTS: 1 89. ANS: Internet PTS: 1 90. ANS: trophy PTS: 1 91. ANS: validation PTS: 1 92. ANS: wireless PTS: 1 93. ANS: modem PTS: 1 94. ANS: review PTS: 1 95. ANS: war PTS: 1 96. ANS: dialing PTS: 1 97. ANS: partner PTS: 1 98. ANS: vendor PTS: 1 99. ANS: instances REF: 537 REF: 538 REF: 539 REF: 540 REF: 541 REF: 542 REF: 544 REF: 546 REF: 542 REF: 527 REF: 521 PTS: 1 REF: 539 100. ANS: vulnerabilities PTS: 1 ESSAY 101. ANS: The core ISO model addresses management and operation through five areas: - Fault management - Configuration and name management - Accounting management - Performance management - Security management PTS: 1 REF: 512 102. ANS: There are four steps associated with configuration management. 1. Configuration identification: The identification and documentation of the various components, implementations, and states of configuration items 2. Configuration control: The administration of changes to the configuration items and the issuance of versions 3. Configuration status accounting: The tracking and recording of the implementation of changes to configuration items 4. Configuration audit: Auditing and controlling the overall configuration management program PTS: 1 REF: 516 103. ANS: The recommended maintenance model is based on five subject areas or domains: - External monitoring - Internal monitoring - Planning and risk assessment - Vulnerability assessment and remediation - Readiness and review PTS: 1 REF: 520 REF: 538

Find millions of documents on Course Hero - Study Guides, Lecture Notes, Reference Materials, Practice Exams and more. Course Hero has millions of course specific materials providing students with the best way to expand their education.

Below is a small sample set of documents:

Art Inst. San Diego - ECON - 101
TheFEARGaugeAnIntroductiontotheVolatility Index byAmyAckersWhatistheVolatilityIndex?BriefOverview Markettoolforinvestors Def:Indexofimpliedvolatilityofeightput/call options,nearthemoneyandsecondnearthe money,fortwostatedstrikepricesgivenbythe S&P100Op
N.E. Illinois - ACTG - 310
Chapter 1Introduction to Federal Taxation2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 1 Exhibits1. 2. 3. 4. 5. 6. 4 Major Types of Federal Taxes Tax Revenue Statistics Tax Avoidance
N.E. Illinois - ACTG - 310
Chapter 3Individual Taxation An Overview2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 3 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Federal Tax Formula Gross Income Examples of For AGI Deduct
N.E. Illinois - ACTG - 310
Chapter 4Gross Income2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 4 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Constructive Receipt Doctrine Community Property Income Items Included in Gros
N.E. Illinois - ACTG - 310
Chapter 5Gross Income Exclusions2009 CCH. All Rights Reserved. 4025 W. Peterson Ave. Chicago, IL 60646-6085 1 800 248 3248 www.CCHGroup.comChapter 5 Exhibits1. 2. 3. 4. 5. 6. 7. 8. 9. Social Security Benefits Interest on U.S. Savings Bonds EE Bonds Us
Ill. Chicago - ACTG - 516
FSA 09 Fa MidT 1Ram T. S. Ramakrishnan 2301, University Hall, 312 996-3270 rramakri@uic.eduhttp:/www.uic.edu/classes/actg/actg516rtr/Open Book and Notes October 19, 2009 MondayShow all your work in the answer sheets. You will not get credit for a righ
Ill. Chicago - ACTG - 516
FedEx 09 Analysis 1Fedex Corporation Consolidated Statements of Cash FlowsNet income a b c d Depreciation and amortization Total goodwill amortized in 2009 was $ Total Intangible assets amortized in 2009 was $ a-b-c Depreciation 1,975 120 98 1,75710030
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Procter and Gamble Solution1 of 5A. The Max Factor acquisition effect must be removed as the purchase is an investing activitydoes not affect operations.Consolidated Statement of Cash FlowsYears Ended June 30 (Millions of Dollars Except Per Share Amo
Ill. Chicago - ACTG - 516
Ill. Chicago - ACTG - 516
Walgreen 2009 1Ram T. S. Ramakrishnan 2303, University Hall, 996-3270 rramakri@uic.edu http:/www.uic.edu/classes/actg/actg516rtr/ March 11, 2010 ThursdayOpen Book and NotesShow all your work in the answer sheets. You will not get credit for a right ans
Ill. Chicago - ACT - 516
Walgreen 2009 Analysis 11 1In Millions, Except Per Share Data 1003181Cash flow from operating activities Net Earnings Depreciation and amortization Change in Accounts receivable, net Inventories Other current assets Trade accounts payable Accrued expe
Ill. Chicago - ACTG - 585
0ba89c7d54989c4728b4dc7b68faef24cf4f82f1.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
56f69efaf45e058293bd92c26a70b99f3a8e889f.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
97def5cb910c411ae7085fd8a57bfcfd2d0c0f89.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 585
ad14b84d99c6279ffae3c51c4f72b2a2ed819b19.xls EXHIBIT 1 - Excerpts from The Gap's 1991 Annual Report CONSOLIDATED BALANCE SHEETS [$000] February 1, 1992 ASSETS Current Assets Cash and equivalents Accounts receivable Merchandise inventory Prepaid expenses a
Ill. Chicago - ACTG - 516
Chapter 1 - SolutionsOverview: Problem Length cfw_S 1 to 23 [M] 24 1.cfw_S(i) Problem #sShort-term lenders are concerned primarily with liquidity. Accounting standards would focus primarily on near-term cash flows and might include cash flow forecasting
Ill. Chicago - ACTG - 516
Chapter 2 SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_S(i) Problem #s 1, 2, 4 - 11, 15, 16, and 18 - 20 3, 12 - 14, 17, and 21 - 23When the product is a commodity with a known price and liquid market.(ii) When collection is assured because the
Ill. Chicago - ACTG - 516
Chapter 3 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 3 2, 7, 8, 12, 13 4 - 6, 9 - 11, 14, 15Palomba Pizza Stores Statement of Cash Flows Year Ended December 31, 2000Cash Flows from Operating Activities: Cash Collectio
Ill. Chicago - ACTG - 516
Chapter 4 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_S a. The identical amount is subtracted from both numerator (CA) and denominator (CL). Since the ratio (before subtraction) is greater than 1 , the effect will be to increase the ratio.
Ill. Chicago - ACTG - 516
Chapter 5 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1,4,5,6,12-15 2,3,7,8,10,11 9NOTE: The problems in this chapter are designed primarily as a basis for discussion of the issues covered in this chapter. There are no absolutely ri
Ill. Chicago - ACTG - 516
Chapter 7 SolutionsOverview: Problem Length cfw_S cfw_M cfw_M cfw_L 1.cfw_M Problem #s 2, 3, 5, 8, and 10 1, 4, 6, 7, 9, 11, 12, and 13 Appendices 7A-1 and 7B-1 7A-2 and 7B-2Exhibit 7S-1 contains the calculations required.Exhibit 7S-1. Chevron Adjustme
Ill. Chicago - ACTG - 516
Chapter 8 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 2, 4, 5, 6, 7, 8, 9 and 15. 1, 3, 10, 12, 13, 14 and 16. 11 and 8A-1.1.cfw_M(i) Straight-line depreciation (ii) Sum-of-years digits Depreciable base Sum-of-yearsdigits Year 1 2 3 4
Ill. Chicago - ACTG - 516
Chapter 8 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 2, 4, 5, 6, 7, 8, 9 and 15. 1, 3, 10, 12, 13, 14 and 16. 11 and 8A-1.1.cfw_M(i) Straight-line depreciation (ii) Sum-of-years digits Depreciable base Sum-of-yearsdigits Year 1 2 3 4
Ill. Chicago - ACTG - 516
Chapter 9 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1 - 4, 6, 11, 15 5, 7 - 9, 13, 14, 16 10, 121.cfw_SDeferred taxes can be found in all of the categories listed. Examples are: (i) Current liabilities may include deferred tax liabi
Ill. Chicago - ACTG - 516
Chapter 9 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1 - 4, 6, 11, 15 5, 7 - 9, 13, 14, 16 10, 121.cfw_SDeferred taxes can be found in all of the categories listed. Examples are: (i) Current liabilities may include deferred tax liabi
Ill. Chicago - ACTG - 516
Chapter 10 - SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_Sa. Problem #s 1 - 2, 6 - 22, and 25 3 - 5, and 23 - 24When full-coupon debt is issued, interest paid reduces cash from operations (CFO). When zero-coupon debt is issued, however, no cash
Ill. Chicago - ACTG - 516
Chapter 11 SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_S(i) Problem #s 1 - 4, 9, 11, 12, 15, 16, 21, 22 5, 7, 8, 10, 13, 14, 17, 18, 20, 23, 24 6, 19, 25Interest expense = 12% x $10,000 (beginning balance of lease obligation) = $1,200.(ii
Ill. Chicago - ACTG - 516
Chapter 12 SolutionsProblem Overview cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 6, 9 - 11, 13, 15, 18, 22 4, 5, 8, 12, 16, 19, 21 2, 3, 7, 14, 17, 20The effect of an increase in the discount rate: (i) The projected benefit obligation (PBO) will decrease
Ill. Chicago - ACTG - 516
Chapter 13 SolutionsOverview: Problem Length: cfw_S cfw_M cfw_L 1.cfw_Ma. (i) Problem #s 4, 8, 11, 14 1, 5, 6, 12, 15 2, 3, 7, 9, 10, 13, 16 Dividend income: X: Z: Total $10,000 (100,000 x $.10) 0 $10,000Dividends are not recorded as income for Y (40% o
Ill. Chicago - ACTG - 516
Chapter 14 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Ma. Problem #s 6 - 11 1-5 12 - 13Martin Sales (Amounts in $millions) Method Purchase method Pooling method 2000 $435 $525 ($435 + $90) 2001 $610 ($550 + $60) $670 ($550 + $120) 2002
Ill. Chicago - ACTG - 516
Chapter 16 - SolutionsOverview: Problem Length cfw_S cfw_M 1.cfw_Sa. Problem #s 1-4, 7-9 10Because their stated interest rate remained constant at 6.5% on both 12/31/00 and 12/31/01, the Notes due 8/12/02 must be the fixed rate notes. The stated interes
Ill. Chicago - ACTG - 516
Chapter 18 - SolutionsOverview: Problem Length cfw_S cfw_M Problem #s 3,7 1, 2, 4 - 6, 8 - 10Problems 1-3 deal with the takeover of Kraft by Philip Morris. If assigned together, they would require approximately 1 1/2 hrs of work.1.cfw_Ma. Pretax intere
Ill. Chicago - ACTG - 516
Chapter 19 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L Problem #s 1, 2, 15,16,17 3,4,5, 7, 10,11,12, 14 6, 8, 9, 131.cfw_SThe models should give identical results. Using 2003 expected dividends of $4.50, a discount rate r of 20%, and growth ra
Ill. Chicago - ACTG - 516
CASE 1-1 Analysis of Contingent Obligation: Bristol-Myers SquibbINTRODUCTIONIn 1992, Bristol-Myers Squibb [BMY], a major U.S. based drug company, reported substantial litigation against the company by recipients of breast implants manufactured and sold
Ill. Chicago - ACTG - 516
Chapter 6 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Sa. Problem #s 1, 2, 7, 14, 15, 17, 19 - 23 3, 4, 10 - 13, 16, 18, 24 5, 6, 8, 9Start with the basic inventory relationship BI + P = COGS + EI Opening inventory Purchases Total (i) 40
Ill. Chicago - ACTG - 516
Chapter 15 - SolutionsOverview: Problem Length cfw_S cfw_M cfw_L 1.cfw_Ma. Problem #s 4, 5, 7, 12 1 - 3, 6, 9, 10, 13 -15 8, 11Because the functional currency of Nippon MT is the yen, the current rate method should be used to translate the yen financial
N.E. Illinois - MNGT - 377
136 Instructor's Manual 1Chapter 7Statistical Inference and SamplingCHAPTER OVERVIEW AND OBJECTIVES Chapter 6 introduced several continuous probability distributions, including the very important normal distribution. In this chapter, the use of the nor
Clemson - CHEM - 101
Project 17: Soaps and Detergents Final Lab Report Briana Ply Chemistry 102 Laboratory, Section 42 Instructor: Bradley Stadelman February 23, 2010My signature indicates that this document represents my own work. Outside of shared data, the information, th
Clemson - CHEM - 224
Project 7: Acids and Bases Final Lab Report Briana Ply Chemistry 102 Laboratory, Section 42 Instructor: Bradley Stadelman April 6, 2010My signature indicates that this document represents my own work. Outside of shared data, the information, thoughts and
Kaplan University - BUSINESS - GB520
Strategic Human Resource Management at InfosysCase AnalysisThomas N. Bailey2/1/2011Kaplan University GB520 Term 1101D Unit 21. IntroductionInfosys is a software company based out of India. It had a humble beginning in 1981, but by March 2003, revenu
Kaplan University - BUSINESS - GB520
Heidrick & Struggles International, Inc.Case AnalysisThomas N. Bailey2/8/2011Kaplan University GB520 Term 1101D Unit 31. IntroductionHeidrick & Struggles International, Inc. is one of the largest U.S. recruiting firms. The company has approximately
ITESM - MECHATRONI - 001
MRAC+HFaultTolerantControlfor LinearParameterVaryingSystemsClicktoeditMastersubtitlestyle AdrianaVargasMartnezVicenPuig LuisE.GarzaCastan RubenMoralesMenendez3/10/11IntroductionThe main intention of this work is to develop apassivestructureofFTCable
N. Arizona - GOVERNMENT - 101
Name: In this next unit we will be taking closer look at political socialization and voting. In order to give you a better understanding of the people who live in the U.S. you will be looking at information found in the following website: http:/ show.mapp
N. Arizona - GOVERNMENT - 101
Living Room Candidate AnalysisLivingRoomCandidateComputerLabAssignmentDIRECTIONS:WelcometotheLivingRoomCandidate,whereTVpoliticaladvertisingisanalyzedfrom1952 2004.a. Accesswww.livingroomcandidate.org b. Youwillanalyzefiveadvertisements,twoareselectedf
N. Arizona - GOVERNMENT - 101
Living Room Candidate AnalysisLiving Room Candidate Computer Lab Assignment DIRECTIONS: Welcome to the Living Room Candidate, where TV political advertising is analyzed from 1952-2004. a. Access www.livingroomcandidate.org b. You will analyze five advert
N. Arizona - GOVERNMENT - 101
Name: In this next unit we will be taking closer look at political socialization and voting. In order to give you a better understanding of the people who live in the U.S. you will be looking at information found in the following website: http:/ show.mapp
N. Arizona - GOVERNMENT - 101
United States President AP Government You are going to do a small amount of research on the presidents of the United States. Make the following lists and answer the following questions. Dont get bogged down in detail.1.Write a list of the presidents, in
University of Phoenix - MANAGEMENT - 520
Problem Solution: Intersect Investments1Intersect Investments Transformational LeadershipProblem Solution: Intersect Investments Since September 11, 2001, financial service organizations have struggled to maintain existing clientele and gain additional
CUNY Baruch - MARKETING - 101
AdvertisingMiriam Reynoso Mercy College Curtis Abel Assignment#1 December 8, 2010#Print AdSince the first time I saw this ad, I completely fell in love. This ad is part of a Nike campaign that have as main focus different parts of the body that women a
UBC - ECON - 302
ECON 302 1.SAMPLE MIDTERM QUESTIONSA non-parallel shift in the production function implies: a. b. c. d. only a substitution effect only a wealth effect both a wealth and substitution effect * that the marginal product of labour schedule stays in its ori
UOIT - ENGR - 2680
Problems 1)2)3)4)Solutions 1) The air in an insulated, rigid compressed-air tank is released until the pressure in the tank reduces to a specified value. The final temperature of the air in the tank is to be determined. Assumptions 1 This is an unstea
Concordia AB - ACCT - 3341
The main goals of Ordinary Shareholderss Agreement:1.Maintainingproportionalsharesownershipbetweentheshareholders; 2.Maintainingthe"closed"natureofthecorporationbypreventingthirdpartiesfrombuying intothecorporationwithouttheotherShareholdersassent; 3.Pro
Concordia AB - ACCT - 354
Problem 4 Cost of 30% investment Book value of Stergis Blakes ownership Purchase discrepancy Allocated: Buildings Balance - goodwill 1,500,000 4,800,000 30% 1,440,000 60,000 FV - BV 84,000 x 30% 25,200 Dr 34,800 DrPart A - Significant Influence January 1
Concordia AB - ACCT - 354
Detailed Contents Of Chapter 2 Investments In Equity SecuritiesINTRODUCTION . . . . . Objectives. . . . . Classification . . . Accounting Methods Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Concordia AB - ACCT - 354
Assignment Problems For Chapter 2 Page 1Assignment Problems For Chapter 2(The solutions for these problems are only available in the solutions manual that has been provided to your instructor.)Assignment Problem Two - 1 (Held-For-Trading and Available-
Concordia AB - ACCT - 354
Assignment Problems For Chapter 3 Page 4Assignment Problems For Chapter 3(The solutions for these problems are only available in the solutions manual that has been provided to your instructor.)Assignment Problem Three - 1 (Purchase Of Assets) On Decemb
Concordia AB - ACCT - 354
Assignment Problems For Chapter 4 Page 9Assignment Problems For Chapter 4(The solutions for these problems are only available in the solutions manual that has been provided to your instructor.)Assignment Problem Four - 1 (Consolidated Balance Sheet at
Concordia AB - ACCT - 354
Assignment Problems For Chapter 5 Page 11Assignment Problems For Chapter 5(The solutions for these problems are only available in the solutions manual that has been provided to your instructor.)Assignment Problem Five - 1 (Open Trial Balance - No Profi
Concordia AB - ACCT - 354
Assignment Problems For Chapter 6 Page 18Assignment Problems For Chapter 6(The solutions for these problems are only available in the solutions manual that has been provided to your instructor.)Assignment Problem Six - 1 (Open Trial Balance - Profits -